🎯 Do you want to build a career in Cyber Security & Ethical Hacking and become an expert in protecting and testing computer systems?
🎯 What You’ll Achieve by the End of This Course
✔️ Strong understanding of Cyber Security fundamentals, attack phases, and defense strategies
✔️ Hands-on experience in reconnaissance, scanning, enumeration, and exploitation
✔️ Ability to use professional tools like Nmap, Metasploit, Wireshark, Burp Suite, Hashcat, and OpenVAS
✔️ Skills to conduct penetration tests, vulnerability assessments, and incident response
✔️ Knowledge of network, web, wireless, IoT, and cloud security
✔️ A fully documented penetration testing project & Capture the Flag (CTF) challenge to showcase in your portfolio
Month 1 – Fundamentals & Reconnaissance
Week 1: Introduction to Ethical Hacking
-
Security Concepts, Cyber Kill Chain, MITRE ATT&CK
-
Risk & Incident Management
-
Lab: MITRE ATT&CK hands-on
Week 2: Footprinting & Reconnaissance
-
OSINT tools, Google Hacking, WHOIS, DNS
-
Labs: Shodan, theHarvester, WHOIS, DNS enumeration
Week 3: Footprinting (Web, Email, Social Media)
-
Website, Email & Network Footprinting
-
Social Media Footprinting & Countermeasures
-
Lab: Traceroute, Website Recon
Week 4: Scanning & Evasion
-
Discovery & Port Scanning (Nmap)
-
IDS/Firewall Evasion, AI-based Scanning
-
Lab: Nmap Port Scanning
Week 5: Enumeration
-
SMB, SNMP, LDAP, SMTP, DNS, Active Directory Enumeration
-
Labs: Directory Enumeration, SMTP Enumeration
Week 6: Vulnerability Assessment
-
Vulnerability Scanning & Analysis (OpenVAS, AI tools)
-
Lab: OpenVAS Hands-on
Week 7: System Hacking
-
Exploits & Buffer Overflow Basics
-
Metasploit & Meterpreter Usage
-
Lab: Exploit Windows (EternalBlue)
Week 8: Linux Exploitation & Password Attacks
-
Linux Exploitation & Post-Exploitation
-
Password Attacks (Hydra, Hashcat, John, Medusa)
-
Labs: Hashcat & Hydra Password Cracking
Week 9: Malware Analysis
-
Viruses, Trojans, Rootkits, Advanced Malware
-
Lab: SolarWinds Hack Analysis, Malware Dropper
Week 10: Sniffing & Spoofing
-
Wireshark, MITM, Responder, Ettercap
-
Labs: MITM Attack, Wireshark Packet Capture
Week 11: Social Engineering Attacks
-
Phishing, Baiting, Insider Threats, AI-driven Phishing
-
Labs: Phishing Simulation, OMG Cable Demo
Week 12: DoS/DDoS & Session Hijacking
-
DoS/DDoS Tools (Slowloris, HOIC)
-
Session Hijacking (XSS, CSRF, Token Theft)
-
Labs: XSS Session Hijack, DoS Attack
Week 13: IDS, Firewalls & Honeypots
-
IDS, Firewalls, Honeypots, Evasion Techniques
-
Lab: WAF Evasion with Burp Suite
Week 14: Web Application Security (OWASP Top 10)
-
Web Server & Application Hacking
-
OWASP Top 10 (SQLi, XSS, CSRF, IDOR, SSRF, XXE, etc.)
-
Labs: Burp Suite IDOR, SQLi Attack
Week 15: Wireless, Mobile, IoT & Cloud Security
-
WPA2 Attacks, Mobile/IoT Exploits, Cloud Security (AWS)
-
Labs: WPA2 KRACK, AWS S3 Bucket Hack, Flipper Zero Demo
✅Final Capstone Project
-
Symmetric/Asymmetric Encryption, Hashing, PKI
-
Final Capture the Flag (CTF): 7 Challenge Labs
-
Student Presentations: Pentest Report
Comments
Post a Comment